![]() |
|
Udemy - Malware Development For Ethical Hackers & Pentesters - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Udemy - Malware Development For Ethical Hackers & Pentesters (/Thread-Udemy-Malware-Development-For-Ethical-Hackers-Pentesters) |
Udemy - Malware Development For Ethical Hackers & Pentesters - OneDDL - 06-30-2025 ![]() Free Download Udemy - Malware Development For Ethical Hackers & Pentesters Published 5/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 11.39 GB | Duration: 20h 45m Master Ethical Malware Development: Learn Techniques to Create, Analyze and Test Malware Safely for Ethical Hacking What you'll learn Ethical Malware Development: Learn how to safely create malware for ethical hacking and penetration testing, focusing on real-world applications and techniques. Antivirus Evasion & Bypass Techniques: Master strategies to bypass antivirus (AV) and endpoint detection systems (EDR), enhancing your malware development skill Malware Analysis & Behavior: Gain hands-on experience in analyzing malware, studying its behavior, and understanding its impact on systems and networks. Privilege Escalation & Persistence: Discover methods to elevate malware privileges and ensure its persistence on compromised systems, even after reboots Advanced Cryptography & Obfuscation: Learn about cryptographic methods and simple ciphers used in malware for encryption and obfuscation, including algorithms Requirements Basic knowledge of programming in C/C++ ,Python and x86/x64 Assembly is recommended. Familiarity with Windows operating systems and their Sysinternals Suit. Understanding of basic cybersecurity concepts and ethical hacking principles. A system capable of running virtual machines (e.g., VMware, VirtualBox) to safely test and analyze malware. A willingness to learn, explore, and apply offensive programming techniques responsibly. Basic knowledge of Linux ( Kali Linux ) Operating system administration. Description Unlock the world of ethical malware development with this in-depth course designed for ethical hackers and pentesters. This course teaches you how malware functions, how to create it safely, and how to bypass antivirus detection in controlled environments, all while enhancing your cybersecurity expertise.You'll explore key concepts in ethical hacking, including the creation and analysis of malware, and gain practical experience in evading antivirus systems. Learn techniques used by professionals to simulate real-world attacks and improve security defenses.The course covers:Ethical malware development practices.Malware behavior analysis in virtualized environments.Antivirus evasion strategies and bypass techniques.Techniques for testing and strengthening security measures.Whether you're an aspiring ethical hacker, a cybersecurity enthusiast, or an experienced pentester, this course will deepen your understanding of how malware operates and provide you with valuable tools for improving security.By the end of the course, you will be able to develop, analyze, and bypass antivirus defenses for testing purposes, giving you a competitive edge in the cybersecurity field.Enroll today to take your ethical hacking skills to the next level and start mastering malware development, antivirus evasion, and more!Keywords: ethical malware development, antivirus evasion, malware analysis, ethical hacking, pentesting, cybersecurity training, antivirus bypass techniques. Overview Section 1: Introduction Lecture 1 Introduction Section 2: Lab setup Lecture 2 Lab setup 1 Section 3: Building the foundation Lecture 3 What is a malware and its types Lecture 4 Introduction to PE file structure Lecture 5 Understanding MS-DOS Header in PE file of windows Lecture 6 Understanding DOS stub in PE file of windows Lecture 7 PE - Header section structure Basics Lecture 8 Understanding PE Headers subsections - Signature, File Header and OptionalHeader Lecture 9 Understanding PE Section Headers Lecture 10 Understanding PE sections in windows Lecture 11 Understanding token, handle and thread of a process Lecture 12 Understanding token information in process hacker Lecture 13 Understanding handle table information Lecture 14 Understanding threads in process hacker Section 4: Windows API programming basics - Handles in Windows Lecture 15 What is a Handle in windows ? Lecture 16 Windows Handle example: Finding out running program using windows handle Lecture 17 Windows Handle example: Hiding , minimizing, maximizing running program Section 5: Windows API programming basics: Creating, Manipulating Processes in windows Lecture 18 Lab configuration in Malware development machine. Lecture 19 Deep diving into CreateProcess function and understanding its input parameters. Lecture 20 Creating a process using CreateProcess function Lecture 21 How can we hide a program using STARTUPINFO structure flags Lecture 22 Hiding program practical demonstration Lecture 23 Hiding program using CreateProcess function flags in windows Lecture 24 Hiding console programs in windows Lecture 25 Understanding inherit handles in CreateProcess function in windows Lecture 26 Practical demonstration of inherit handle in CreateProcess function Lecture 27 How to set custom environment variable for child process in windows Lecture 28 How to set custom working directory for child process in CreateProcess function Lecture 29 How to open a process using OpenProcess windows api function Section 6: Thread basics in windows API programming Lecture 30 Understanding CreateThread function working in windows Lecture 31 Practical demonstration of thread creation with CreateThread windows function Lecture 32 How to execute a shellcode with CreateThread function Lecture 33 Practical demonstration of executing a shellcode with CreateThread function Lecture 34 Understanding ANSI and UNICODE in windows programming Section 7: Malware injection attacks in windows operating system Lecture 35 Understanding how to inject code into other running processes in windows Lecture 36 Practical demonstration of malware code injection into other processes in window Lecture 37 Understanding DLL injection attack in windows Lecture 38 Practical demonstration of DLL injection attack in windows Lecture 39 Understanding DLL hijacking concept in windows Lecture 40 Practical demonstration of DLL hijacking in windows Lecture 41 Understanding APC code injection technique Lecture 42 APC injection practical demonstration in windows Section 8: Malware persistence Lecture 43 Malware persistence using registry entry Lecture 44 Practical demonstration of Malware persistence using registry entry Lecture 45 Malware persistence via Winlogon Lecture 46 Practical demonstration of malware persistence via Winlogon Lecture 47 Understanding malware persistence by creating Malicious Windows Services Lecture 48 Practical demonstration of malware persistence via creating Windows Service Section 9: Privilege escalations - Token stealing in Windows Lecture 49 Understanding basic token theft concept Lecture 50 How to enable SeDebugPrivilege - understanding basic concept Lecture 51 Understanding the working of enable SeDebugPrivilege program Lecture 52 Practical demonstration of enabling SeDebugPrivilege of a program token Lecture 53 Understanding the basic steps of how to steal token of winlogon process Lecture 54 Practical demonstration of stealing token of winlogon process Section 10: Privilege escalation - Password stealing from lsass process in windows Lecture 55 What is lsass process in windows ? Lecture 56 How do we steal the password from lsass process in windows ? Lecture 57 Understanding Windows API functions used in finding the target process id Lecture 58 Understanding the program logic of process id ( lsass.exe ) finding program Lecture 59 Practical demonstration of finding the process id of lsass in Windows Lecture 60 Understanding the program flow of password stealing program from lsass process Lecture 61 Practical demonstration of dumping the memory of lsass process from our malware Lecture 62 Extracting the password hashes from the lsass dump file Ethical Hackers & Pentesters: Professionals looking to enhance their skills in malware development, analysis, and antivirus evasion for penetration testing.,Cybersecurity Enthusiasts: Individuals passionate about understanding malware mechanics and offensive programming techniques.,Aspiring Malware Analysts: Those interested in studying malware behavior, persistence, and obfuscation methods in controlled environments.,Red Team Operators: Security experts aiming to simulate real-world attacks to identify vulnerabilities and improve defenses.,Advanced Learners in Cybersecurity: Students or professionals seeking to deepen their knowledge of malware development, privilege escalation, and anti-debugging strategies. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |